Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.115.42.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50558
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.115.42.229.			IN	A

;; AUTHORITY SECTION:
.			464	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:04:35 CST 2022
;; MSG SIZE  rcvd: 106
Host info
229.42.115.13.in-addr.arpa domain name pointer ec2-13-115-42-229.ap-northeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
229.42.115.13.in-addr.arpa	name = ec2-13-115-42-229.ap-northeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.169.37 attack
Aug  4 11:23:28 sip sshd[1186515]: Failed password for root from 139.59.169.37 port 33838 ssh2
Aug  4 11:28:12 sip sshd[1186541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.37  user=root
Aug  4 11:28:14 sip sshd[1186541]: Failed password for root from 139.59.169.37 port 45348 ssh2
...
2020-08-04 17:59:19
222.186.30.35 attackspambots
Unauthorized connection attempt detected from IP address 222.186.30.35 to port 22
2020-08-04 18:15:26
103.209.178.64 attackspambots
CPHulk brute force detection (a)
2020-08-04 17:58:03
205.185.119.117 attackbotsspam
TCP port : 23
2020-08-04 18:15:51
185.123.164.54 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-04T09:23:42Z and 2020-08-04T09:31:40Z
2020-08-04 18:14:46
196.15.211.92 attackspambots
Aug  4 05:12:57 master sshd[9004]: Failed password for root from 196.15.211.92 port 58741 ssh2
Aug  4 05:31:44 master sshd[9615]: Failed password for root from 196.15.211.92 port 52398 ssh2
Aug  4 05:38:38 master sshd[9669]: Failed password for root from 196.15.211.92 port 51889 ssh2
Aug  4 05:45:21 master sshd[9843]: Failed password for root from 196.15.211.92 port 51376 ssh2
Aug  4 05:51:55 master sshd[9938]: Failed password for root from 196.15.211.92 port 50865 ssh2
Aug  4 05:58:18 master sshd[10037]: Failed password for root from 196.15.211.92 port 50348 ssh2
Aug  4 06:05:09 master sshd[10545]: Failed password for root from 196.15.211.92 port 49838 ssh2
Aug  4 06:11:48 master sshd[10672]: Failed password for root from 196.15.211.92 port 49322 ssh2
Aug  4 06:18:39 master sshd[10744]: Failed password for root from 196.15.211.92 port 48812 ssh2
Aug  4 06:25:14 master sshd[11086]: Failed password for root from 196.15.211.92 port 48298 ssh2
2020-08-04 18:12:26
122.51.248.76 attackbotsspam
Aug  4 06:27:46 ws24vmsma01 sshd[126160]: Failed password for root from 122.51.248.76 port 42868 ssh2
...
2020-08-04 18:11:26
222.186.180.17 attackspam
Aug  4 11:50:14 vm1 sshd[32047]: Failed password for root from 222.186.180.17 port 53762 ssh2
Aug  4 11:50:28 vm1 sshd[32047]: error: maximum authentication attempts exceeded for root from 222.186.180.17 port 53762 ssh2 [preauth]
...
2020-08-04 17:53:22
190.8.149.146 attackbots
Aug  4 11:15:37 ns382633 sshd\[30478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.8.149.146  user=root
Aug  4 11:15:39 ns382633 sshd\[30478\]: Failed password for root from 190.8.149.146 port 47853 ssh2
Aug  4 11:26:42 ns382633 sshd\[32438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.8.149.146  user=root
Aug  4 11:26:45 ns382633 sshd\[32438\]: Failed password for root from 190.8.149.146 port 57742 ssh2
Aug  4 11:31:34 ns382633 sshd\[940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.8.149.146  user=root
2020-08-04 17:40:27
167.114.3.158 attackbots
Aug  4 05:59:20 NPSTNNYC01T sshd[12368]: Failed password for root from 167.114.3.158 port 45040 ssh2
Aug  4 06:03:07 NPSTNNYC01T sshd[12722]: Failed password for root from 167.114.3.158 port 55708 ssh2
...
2020-08-04 18:07:04
218.92.0.247 attackbotsspam
Aug  4 11:42:39 vps sshd[495336]: Failed password for root from 218.92.0.247 port 36632 ssh2
Aug  4 11:42:42 vps sshd[495336]: Failed password for root from 218.92.0.247 port 36632 ssh2
Aug  4 11:42:46 vps sshd[495336]: Failed password for root from 218.92.0.247 port 36632 ssh2
Aug  4 11:42:49 vps sshd[495336]: Failed password for root from 218.92.0.247 port 36632 ssh2
Aug  4 11:42:52 vps sshd[495336]: Failed password for root from 218.92.0.247 port 36632 ssh2
...
2020-08-04 17:44:27
201.231.115.87 attack
201.231.115.87 (AR/Argentina/87-115-231-201.fibertel.com.ar), 12 distributed sshd attacks on account [root] in the last 3600 secs
2020-08-04 17:38:40
95.111.74.98 attackbots
Failed password for root from 95.111.74.98 port 41626 ssh2
2020-08-04 17:33:56
27.100.13.252 attackspambots
SMB Server BruteForce Attack
2020-08-04 17:36:29
121.8.219.186 attack
Unauthorized connection attempt detected from IP address 121.8.219.186 to port 1433
2020-08-04 17:30:36

Recently Reported IPs

13.115.25.84 13.115.58.231 13.115.88.57 13.115.6.150
13.115.76.100 13.116.91.74 13.115.96.118 13.124.105.110
13.124.114.22 13.124.114.241 13.124.115.75 13.124.115.178
13.124.119.63 13.124.132.92 13.124.132.8 13.124.143.220
24.193.84.195 13.124.163.18 13.124.135.68 13.124.235.34